A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators

被引:1
|
作者
Nuida, Koji [1 ]
Abe, Takuro [2 ]
Kaji, Shizuo [3 ]
Maeno, Toshiaki [4 ]
Numata, Yasuhide [5 ]
机构
[1] Natl Inst Sci & Technol AIST, Res Inst Secure Syst RISEC, Tsukuba, Ibaraki 3058568, Japan
[2] Kyoto Univ, Dept Mech Engn & Sci, Kyoto 6068501, Japan
[3] Yamaguchi Univ, Fac Sci, Dept Math Sci, Yamaguchi 7538512, Japan
[4] Meijo Univ, Dept Math, Nagoya, Aichi 4688502, Japan
[5] Shinshu Univ, Dept Math Sci, Nagano 3908621, Japan
关键词
Function density problem; hash function; pseudorandom generator; security evaluation;
D O I
10.1142/S0129054115500100
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we specify a class of mathematical problems, which we refer to as "Function Density Problems" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves.
引用
收藏
页码:169 / 194
页数:26
相关论文
共 50 条
  • [11] How to Use Pseudorandom Generators in Unconditional Security Settings
    Nuida, Koji
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 291 - 299
  • [12] On the security of modular exponentiation with application to the construction of pseudorandom generators
    Goldreich, O
    Rosen, V
    JOURNAL OF CRYPTOLOGY, 2003, 16 (02) : 71 - 93
  • [14] Pseudorandom numbers and hash functions from iterations of multivariate polynomials
    Alina Ostafe
    Igor E. Shparlinski
    Cryptography and Communications, 2010, 2 : 49 - 67
  • [15] Pseudorandom numbers and hash functions from iterations of multivariate polynomials
    Ostafe, Alina
    Shparlinski, Igor E.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2010, 2 (01): : 49 - 67
  • [16] On linear-size pseudorandom generators and hardcore functions
    Baron, Joshua
    Ishai, Yuval
    Ostrovsky, Rafail
    THEORETICAL COMPUTER SCIENCE, 2014, 554 : 50 - 63
  • [17] The complexity of constructing pseudorandom generators from hard functions
    Viola, E
    COMPUTATIONAL COMPLEXITY, 2005, 13 (3-4) : 147 - 188
  • [18] Hash Functions Based on Three Permutations: A Generic Security Analysis
    Mennink, Bart
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 330 - 347
  • [19] Pseudorandom Generators based on one-way functions
    Gao, Shujing
    Song, Tingqiang
    Zhang, Wei
    Applied Decisions in Area of Mechanical Engineering and Industrial Manufacturing, 2014, 577 : 820 - 823
  • [20] Security Analysis of Even-Mansour Structure Hash Functions
    Chen, Shiwei
    Cui, Ting
    Jin, Chenhui
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 163 - 173